Professional Documents
Culture Documents
4th Year Assi
4th Year Assi
4th Year Assi
Note: Second Normal Form (2 NF) is only ever a problem when we’re using a composite
primary key. That is, a primary key made of two or more columns.
Third Normal Form (3 NF): The third normal form states that you should
eliminate fields in a table that do not depend on the key.
o A Table is already in 2 NF
Credit cards give you access to a line of credit issued by a bank, while debit
cards deduct money directly from your bank account.
Credit cards offer better consumer protections against fraud compared with debit
cards linked to a bank account.
Newer debit cards offer more credit card-like protection, while many credit cards
no longer charge annual fees.
Part 1:- AIS ASSIGNMENT FOR (4th year)
#Part 2 choice
1. Sending remittance data and payments together electronically is referred to as
A. EDI B. EFT C. FVAN D. FEDI
2. Which of the following is not a control issue associated with electronic commerce?
A. invalid transaction B. unauthorized transactions C. lack of an audit trail D. loss of
confidentiality
3. A network used to implement FEDI is A. the internet B. an FVAN C. an intranet
D. an extranet
4. Which approach to encryption is the most secure for a server that deals with many
unknown clients? A. public key encryption B. secret key encryption C. digital
signature D. none
5. Which of the following is used to store digital cash on a personal computer? A.
electronic digest B. digital signing unit C. virtual cash transporting system
D. none
6. Which of the following statements is true regarding digital signatures? A. they
require the related message to be encrypted
B. they do not require the related message to be encrypted
C. they require the use of message digests D. none